Mixmode Blog
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Phishing for Bitcoin: The Twitter Hack Masterminded by a 17 Year Old
The evidence indicates that these attackers are traditionally specialized in hijacking social media accounts via SIM Swapping.
Read MoreGuide: How to Choose an AI-Based Cybersecurity Platform
Most cybersecurity vendors today tout some form of “Artificial Intelligence” as an underlying mechanism for the differentiation of their product among the market. But if everyone is saying they have AI, and everyone is also claiming theirs is the “best,” how can they all be telling the truth?
Read MoreWebinar Recap: The Next-Generation AI Powered SOC Platform
One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route out these inefficiencies.
Read MoreDeep Dive: How much time do security teams spend labeling with Supervised Learning?
Many CISOs and SecOps teams were faced with a gut-wrenching choice: addressing the operational challenges of keeping workers connected, or shoring up vulnerabilities before hackers exploited them. Both options involved time-consuming, repetitive, manual work.
Read MoreWhy a Platform With a Generative Baseline Matters
MixMode creates a generative baseline. Unlike the historically-based baselines provided by add-on NTA solutions, a generative baseline is predictive, real-time, and accurate. MixMode provides anomaly detection and behavioral analytics and the ability to suppress false positives and surface true positives.
Read MoreWhy The Future of Cybersecurity Needs Both Humans and AI Working Together
A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental tasks.
Read MoreOur Q2 Top Cybersecurity Insights
Since we determine everything on data here at MixMode, we went into our website data to see which of our Q2 articles got the most traffic over the past few months. Not surprisingly, the majority of our top articles covered topics on the advancement of AI in cybersecurity and network traffic analysis (NTA).
Read MoreNTA and NDR: The Missing Piece
Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from SIEM deployments, because the data ingest significantly increases the required data aggregation and storage costs typically 3-5x.
Read MoreThe Problem with Relying on Log Data for Cybersecurity
One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.
Read More